Server-side attacks target vulnerabilities on the server, often involving code execution, data manipulation, or unauthorized access to server resources. Let’s evaluate each option:
Option A ("OS Code Injection"): This is a server-side attack where an attacker injects operating system commands (e.g., via system() calls in PHP) to execute arbitrary code on the server, such as rm -rf /.
Option B ("Cross-Site Request Forgery"): CSRF is a client-side attack where an attacker tricks a user’s browser into making an unintended request to a server where the user is authenticated (e.g., submitting a form to transfer funds). The attack exploits the client’s trust in the user’s session, not a server-side vulnerability. Thus, it is not a server-side attack.
Option C ("SQL Injection"): This is a server-side attack where an attacker injects malicious SQL code into a query (e.g., ' OR '1'='1) to manipulate the database, potentially extracting data or modifying records.
Option D ("Directory Traversal Attack"): This is a server-side attack where an attacker manipulates file paths (e.g., ../../etc/passwd) to access unauthorized files on the server outside the intended directory.
The correct answer is B, aligning with the CAP syllabus under "Client-Side vs. Server-Side Attacks" and "CSRF Prevention."References: SecOps Group CAP Documents - "CSRF Vulnerabilities," "Server-Side Attacks," and "OWASP Top 10 (A08:2021 - Software and Data Integrity Failures)" sections.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit